WebAssembly_Really_Safe.pdf
1.3 MB
#Research
"Is WebAssembly Really Safe? --Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way"
]-> Tool: https://github.com/ha1vk/blackhat_wasm
📰
📚
"Is WebAssembly Really Safe? --Wasm VM Escape and RCE Vulnerabilities Have Been Found in New Way"
]-> Tool: https://github.com/ha1vk/blackhat_wasm
📰
📚
Destabilizing_Hash_Table_MsIIS.pdf
4.5 MB
#Offensive_security
BlackHat USA 2022:
"Let's Dance in the Cache: Destabilizing Hash Table on Microsoft IIS"
📰
📚
BlackHat USA 2022:
"Let's Dance in the Cache: Destabilizing Hash Table on Microsoft IIS"
📰
📚
RE_Mind.pdf
4.5 MB
#Research
#reversing
"RE-Mind: a First Look Inside the Mind of a Reverse Engineer", 31st USENIX, 2022.
]-> Code for UI, backend, engine and statistical analysis for RE:
https://github.com/elManto/REmind
📰
📚
#reversing
"RE-Mind: a First Look Inside the Mind of a Reverse Engineer", 31st USENIX, 2022.
]-> Code for UI, backend, engine and statistical analysis for RE:
https://github.com/elManto/REmind
📰
📚
Internal_Srv_Error.pdf
1.5 MB
#Threat_Research
BlackHat USA 2022:
"Internal Server Error: Exploiting Inter-Process Communication in SAP's HTTP Server"
]-> Whitepaper (.pdf): https://i.blackhat.com/USA-22/Wednesday/US-22-Doyhenard-Internal-Server-Error-wp.pdf
📰
📚
BlackHat USA 2022:
"Internal Server Error: Exploiting Inter-Process Communication in SAP's HTTP Server"
]-> Whitepaper (.pdf): https://i.blackhat.com/USA-22/Wednesday/US-22-Doyhenard-Internal-Server-Error-wp.pdf
📰
📚
ELF.pdf
3.8 MB
#Offensive_security
BlackHat USA 2022:
"ELF Section Docking Revisiting Stageless Payload Delivery"
]-> ELF Sectional docking payload injector system:
https://github.com/xforcered/elfpack
📰
📚
BlackHat USA 2022:
"ELF Section Docking Revisiting Stageless Payload Delivery"
]-> ELF Sectional docking payload injector system:
https://github.com/xforcered/elfpack
📰
📚
Taking_Kerberos_Next_Level.pdf
5.2 MB
#tools
#Blue_Team
BlackHat USA 2022:
"Taking Kerberos To The Next Level"
]-> Set of tools to analyze Windows sandboxes for exposed attack surface:
https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools
📰
📚
#Blue_Team
BlackHat USA 2022:
"Taking Kerberos To The Next Level"
]-> Set of tools to analyze Windows sandboxes for exposed attack surface:
https://github.com/googleprojectzero/sandbox-attacksurface-analysis-tools
📰
📚
Blasting_Event_Driven_Cornucopia.pdf
4.7 MB
#tools
BlackHat USA 2022:
"Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs"
]-> MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x/EPT features:
https://github.com/IgorKorkin/MemoryRanger
📰
📚
BlackHat USA 2022:
"Blasting Event-Driven Cornucopia: WMI-based User-Space Attacks Blind SIEMs and EDRs"
]-> MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x/EPT features:
https://github.com/IgorKorkin/MemoryRanger
📰
📚
New_Memory_Forensics_Techniques.pdf
3.1 MB
#Blue_Team
BlackHat USA 2022:
"New Memory Forensics Techniques to Defeat Device Monitoring Malware"
📰
📚
BlackHat USA 2022:
"New Memory Forensics Techniques to Defeat Device Monitoring Malware"
📰
📚
PISE.pdf
160.3 KB
#Research
BlackHat USA 2022:
"PISE: Protocol Inference using Symbolic Execution and Automata Learning"
]-> Tool: https://github.com/ron4548/PISEServer
📰
📚
BlackHat USA 2022:
"PISE: Protocol Inference using Symbolic Execution and Automata Learning"
]-> Tool: https://github.com/ron4548/PISEServer
📰
📚